Business and social evaluation of denial of service attacks in view of scaling economic counter-measures
AbstractThis paper gives an analytical method to determine the economic and indirect implications of denial of service and distributed denial of service attacks. It is based on time preference dynamics applied to the monetary mass for the restoration of capabilities, on long term investments to rebuild capabilities, and of the usability level of the capabilities after an attack. A simple illustrative example is provided for a denial of service on a corporate data centre. The needed data collection methodologies are categorized by classes of targets. The use of the method is explained in the context of legal or policy driven dissuasive, retaliation or compensation/ restoration actions. A concrete set of deployment cases in the communications service and transport industries is discussed. The conclusion includes policy recommendations as well as information exchange requirements.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
Bibliographic InfoPaper provided by University Library of Munich, Germany in its series MPRA Paper with number 16115.
Date of creation: 20 Jun 2009
Date of revision:
Cyberwar; Denial of service; Business implications; Social implications; Mobile communications; Insurance;
Find related papers by JEL classification:
- C5 - Mathematical and Quantitative Methods - - Econometric Modeling
- H56 - Public Economics - - National Government Expenditures and Related Policies - - - National Security and War
- O3 - Economic Development, Technological Change, and Growth - - Technological Change; Research and Development; Intellectual Property Rights
This paper has been announced in the following NEP Reports:
- NEP-ALL-2009-07-11 (All new papers)
You can help add them by filling out this form.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Ekkehart Schlicht).
If references are entirely missing, you can add them using this form.